lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20020829203027.1898.qmail@updates.danen.net>
From: security at linux-mandrake.com (Mandrake Linux Security Team)
Subject: MDKSA-2002:055 - hylafax update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           hylafax
Advisory ID:            MDKSA-2002:055
Date:                   August 28th, 2002
Affected versions:      7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1
________________________________________________________________________

Problem Description:

 Numerous vulnerabilities in the HylaFAX product exist in versions prior
 to 4.1.3.  It does not check the TSI string which is received from
 remote FAX systems before using it in logging and other places.  A
 remote sender using a specially formatted TSI string can cause the
 faxgetty program to segfault, resulting in a denial of service.  Format
 string vulnerabilities were also discovered by Christer Oberg, which 
 exist in a number of utilities bundled with HylaFax, such as faxrm, 
 faxalter, faxstat, sendfax, sendpage, and faxwatch.  If any of these
 tools are setuid, they could be used to elevate system privileges.
 Mandrake Linux does not, by default, install these tools setuid.
 Finally, Lee Howard discovered that faxgetty would segfault due to a
 buffer overflow after receiving a very large line of image data.  This
 vulnerability could conceivably be used to execute arbitrary commands
 on the system as root, and could also be exploited more easily as a
 denial of sevice.
________________________________________________________________________

References:

  http://www.securityfocus.com/archive/1/215984
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-1034
  http://www.securityfocus.com/bid/3357
________________________________________________________________________

Updated Packages:

 Linux-Mandrake 7.1:
 1bbb83c824d07e017a36c2c85b92c3b7  7.1/RPMS/hylafax-4.1-0.11mdk.i586.rpm
 3f4e469a6c57529fe02025ea7b4bef45  7.1/RPMS/hylafax-client-4.1-0.11mdk.i586.rpm
 9b0952a5701bc2ffaa6068b4b0901ede  7.1/RPMS/hylafax-server-4.1-0.11mdk.i586.rpm
 c44d130f10049d79f7a60601b9844b6e  7.1/SRPMS/hylafax-4.1-0.11mdk.src.rpm

 Linux-Mandrake 7.2:
 37c7c3efa774714204c22e6bde81f432  7.2/RPMS/hylafax-4.1-0.11mdk.i586.rpm
 37cb7b798ffaf93aba0782b4fb760a39  7.2/RPMS/hylafax-client-4.1-0.11mdk.i586.rpm
 b28df42826dc9a833c7f19ad92dacbec  7.2/RPMS/hylafax-server-4.1-0.11mdk.i586.rpm
 c44d130f10049d79f7a60601b9844b6e  7.2/SRPMS/hylafax-4.1-0.11mdk.src.rpm

 Mandrake Linux 8.0:
 a3676fb894765134d5669f914e39f10c  8.0/RPMS/hylafax-4.1.3-1.1mdk.i586.rpm
 27c72f3ad72e85abc4c527fa44d625e9  8.0/RPMS/hylafax-client-4.1.3-1.1mdk.i586.rpm
 b1effc6accf5c808694ee312abf08140  8.0/RPMS/hylafax-server-4.1.3-1.1mdk.i586.rpm
 070d143881cf21632484fcd65fad1aa0  8.0/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.i586.rpm
 a4f1487efa5cc026103d80c96dd41a43  8.0/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.i586.rpm
 ff2a96e07f08a70a8f0d9b734a37c122  8.0/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm

 Mandrake Linux 8.0/ppc:
 e51efc370f2bb4af971457edd5dda1e9  ppc/8.0/RPMS/hylafax-4.1.3-1.1mdk.ppc.rpm
 3b15cb44ed18c353c154e7d97fecc4ba  ppc/8.0/RPMS/hylafax-client-4.1.3-1.1mdk.ppc.rpm
 73af1b321e30ed8d7740c1e8a0b60a67  ppc/8.0/RPMS/hylafax-server-4.1.3-1.1mdk.ppc.rpm
 6225da0393fd8f80c2dfebd85df5998e  ppc/8.0/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.ppc.rpm
 eac3efd3d7c5184312bd4aa793a8a8e7  ppc/8.0/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.ppc.rpm
 ff2a96e07f08a70a8f0d9b734a37c122  ppc/8.0/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm

 Mandrake Linux 8.1:
 1947a6895cdfe3c4bda4fc100b3c1276  8.1/RPMS/hylafax-4.1.3-1.1mdk.i586.rpm
 13fcd879330de0cb58bc8c8c99595291  8.1/RPMS/hylafax-client-4.1.3-1.1mdk.i586.rpm
 2450c7ec306a4e5c9e6a73d8d09bafc6  8.1/RPMS/hylafax-server-4.1.3-1.1mdk.i586.rpm
 862d14c12e65ee9f82451ad911bc8df7  8.1/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.i586.rpm
 f5b5c5a4b3137277793adf385ffba962  8.1/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.i586.rpm
 ff2a96e07f08a70a8f0d9b734a37c122  8.1/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm

 Mandrake Linux 8.1/ia64:
 07a96e577b97485a6d723743196ad248  ia64/8.1/RPMS/hylafax-4.1.3-1.1mdk.ia64.rpm
 1d2ee7c691e72978ea49c0eec3c945b4  ia64/8.1/RPMS/hylafax-client-4.1.3-1.1mdk.ia64.rpm
 248d6879e45952ae2c9494e91297b0b6  ia64/8.1/RPMS/hylafax-server-4.1.3-1.1mdk.ia64.rpm
 3f48d8f2283917f3b451dcaf9deb3edf  ia64/8.1/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.ia64.rpm
 16dee4b27fc1fc63ccd377e1340d371c  ia64/8.1/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.ia64.rpm
 ff2a96e07f08a70a8f0d9b734a37c122  ia64/8.1/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm

 Mandrake Linux 8.2:
 e3c962f212ba5faf2bbbf9bbe97ac39b  8.2/RPMS/hylafax-4.1.3-1.1mdk.i586.rpm
 27d3a86f8bd39560468fdc5b9be66269  8.2/RPMS/hylafax-client-4.1.3-1.1mdk.i586.rpm
 60f4529da79fcc543502d650a2782178  8.2/RPMS/hylafax-server-4.1.3-1.1mdk.i586.rpm
 0f2044dfb51f6b086f0620965f810da3  8.2/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.i586.rpm
 0542d8bd7f1f98784af674c107ede594  8.2/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.i586.rpm
 ff2a96e07f08a70a8f0d9b734a37c122  8.2/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm

 Mandrake Linux 8.2/ppc:
 72c6a45d7a11fb1b69a3fd8ebb9b0fc8  ppc/8.2/RPMS/hylafax-4.1.3-1.1mdk.ppc.rpm
 a26c8f863ac3b71ebea178e3a946b173  ppc/8.2/RPMS/hylafax-client-4.1.3-1.1mdk.ppc.rpm
 16bab89e373b104b3cbe910e103297e8  ppc/8.2/RPMS/hylafax-server-4.1.3-1.1mdk.ppc.rpm
 a2fe9322f593f6d56f319c439e4a952d  ppc/8.2/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.ppc.rpm
 2d60a7ab5d1b41b85511f3302a5044de  ppc/8.2/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.ppc.rpm
 ff2a96e07f08a70a8f0d9b734a37c122  ppc/8.2/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm

 Corporate Server 1.0.1:
 1bbb83c824d07e017a36c2c85b92c3b7  1.0.1/RPMS/hylafax-4.1-0.11mdk.i586.rpm
 3f4e469a6c57529fe02025ea7b4bef45  1.0.1/RPMS/hylafax-client-4.1-0.11mdk.i586.rpm
 9b0952a5701bc2ffaa6068b4b0901ede  1.0.1/RPMS/hylafax-server-4.1-0.11mdk.i586.rpm
 c44d130f10049d79f7a60601b9844b6e  1.0.1/SRPMS/hylafax-4.1-0.11mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

________________________________________________________________________

To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one 
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig <filename>

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

  https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to 
update.

You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

  http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security@...ux-mandrake.com
________________________________________________________________________

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security@...ux-mandrake.com>


- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.7 (GNU/Linux)
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=yGlX
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE9boRjmqjQ0CJFipgRAougAJ4iW8vJLzjt8Sn/HLRxb+cUgtoUTgCbBqas
Cr17AZYeMB+5mAA1SqvLuf8=
=Ba7y
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ